Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Homeland Security Presidential Directive 8 Annex 1
"This Annex is intended to further enhance the preparedness of the United States by formally establishing a standard and comprehensive approach to national planning. It is meant to provide guidance for conducting planning in accordance with the Homeland Security Management System in the National Strategy for Homeland Security of 2007."
United States. Department of Homeland Security
2007-12-03
-
US-CERT Monthly Activity Summary, November 2007
"During the month of November 2007, US-CERT issued seventeen (17) current activity updates, four (4) technical cyber security alerts, four (4) cyber security alerts, two (2) cyber security tips, and four (4) weekly cyber security bulletin summary reports. Security highlights this month include the phishing email impersonating government agencies, multiple updates from Apple and Microsoft, the Cyber Security Awareness Summit, and the FBI's Operation Bot Roast II."
United States. Department of Homeland Security
2007-11
-
Frequently Asked Questions: Chemical Facility Anti-Terrorism Standards: Final Appendix A
This document provides answers for a number of questions relating to Appendix A of the Chemical Facility Anti-Terrorism Standards. "Appendix A of the Chemical Facility Anti-Terrorism Standards (CFATS) regulation lists the DHS chemicals of interest and their corresponding Screening Threshold Quantities (STQ). If a facility possesses, or later comes into possession, of a chemical of interest at or above the specified screening threshold quantity, that facility must complete an easy-to-use online consequence assessment tool, known as a Top-Screen. It is important to note that many facilities that will fill out the Top-Screen may not be subject to further regulation under CFATS by DHS. Appendix A and the Top-Screen will allow DHS to make preliminary determinations about whether facilities present a high level of security risk."
United States. Department of Homeland Security
2007-11-02
-
US-CERT Monthly Activity Summary, December 2007
"During the month of December 2007, US-CERT issued thirteen (13) current activity updates, three (3) technical cyber security alerts, three (3) cyber security alerts (non-technical), two (2) cyber security tips, and four (4) weekly cyber security bulletin summary reports. Highlights for the month include new Storm Worm activity, multiple vulnerabilities in Adobe Flash, Apple Mac OS X, and Microsoft Windows."
United States. Department of Homeland Security
2007-12
-
Fact Sheet: General Aviation
"To address the General Aviation (GA) security vulnerability, DHS developed a long-term strategy intended to enhance international and domestic general aviation security by: identifying and vetting passengers and crew on international GA and private aircraft prior to entering and departing U.S. airspace; screening aircraft to ensure that illicit materials do not enter the U.S.; and conducting these screening and vetting activities as far from critical sites within the U.S. as practicable, preferably at the last point of departure for the aircraft outside the U.S."
United States. Department of Homeland Security
2007-11-05
-
Remarks of Cybersecurity and Communications Assistant Secretary Greg Garcia at the Dartmouth CIO/CISO Executive Workshop on Cyber Security [October 11, 2007]
From the remarks of Greg Garcia: "I'm proud to say we've shown a number of tangible accomplishments in the human resources area over the past year since I've been in office. For example: This year we added 12 national centers of academic excellence in information assurance education. This joint program between the National Security Agency and DHS/NCSD is now educating students for careers in IT security at 86 centers in 34 states and Washington, D.C.; NCSD's sponsorship, with the National Science Foundation, the Office of Personnel Management, and the Federal Chief Information Officer Council, of an annual scholarship for service symposium/job fair increased placement of Scholarship for Service students in Federal jobs and summer internships to over 90 percent, and; The second annual national collegiate cyber defense competition, sponsored by NCSD, involved 44 schools - up from 5 original schools - and capped a series of state and regional cyber security competitions. This effort continues to expand. But we're not quite where we need to be."
United States. Department of Homeland Security
2007-09-28
-
United States Department of Homeland Security, National Protection and Programs Directorate: National Infrastructure Advisory Council, October 2007
"The NIAC shall support a coordinated effort by both government and private sector entities to advise the President on issues related to the security of the nation's critical infrastructures in key sectors of the economy as identified by the President. The NIAC shall draw on the expertise of its members to provide advice and make recommendations on the following: enhancing cooperation between the public and private sectors in protecting information systems, supporting critical infrastructures in key economic sectors, and providing reports on the issue to the President, as appropriate; enhancing cooperation between the public and private sectors in protecting critical infrastructure assets and increasing resiliency in key economic sectors and providing reports on these issues to the President, as appropriate; and proposing and developing ways to encourage private industry to perform periodic risk assessments of its critical information and telecommunications systems."
United States. Department of Homeland Security
2007-10
-
Fact Sheet: Fiscal Year 2007 Competitive Training Grants Program (CTGP) [September 28, 2007]
"The Competitive Training Grants Program (CTGP) is an important component of the Administration's larger, coordinated effort to strengthen homeland security preparedness. Through CTGP, funds are provided to support the development of national preparedness training initiatives that further the homeland security mission. The CTGP supports our overall goals for national preparedness as outlined in the National Preparedness Guidelines and Homeland Security Directives. Since the inception of the CTGP in Fiscal Year (FY) 2004, over $121 million has been awarded."
United States. Department of Homeland Security
2007-09-28
-
Fact Sheet: Fiscal Year 2007 Homeland Security National Training Program (HSNTP) [September 28, 2007]
"Under the Fiscal Year (FY) 2007 Homeland Security National Training Program (HSNTP), over $84 million in cooperative and inter-agency agreements are being awarded to applicants to design, develop, and deliver training content and support for Federal, State, local, and tribal jurisdictions in accordance with DHS doctrine guidance and approved Homeland Security Strategies. This is in addition to over $98 million in HSNTP funds previously awarded in FY 2007. Training will be designed for and delivered to appropriate State and local personnel in emergency management, public health, clinical care, public works, public safety, the private sector, nonprofits, faith-based, and community organizations."
United States. Department of Homeland Security
2007-09-28
-
Statement by Homeland Security Secretary Michael Chertoff on the No-Match Regulation Ruling by the U.S. District Court for the Northern District of California [October 10, 2007]
"Although the Judge rejected many of the plaintiff's legal challenges to the department's no-match regulation, we are disappointed by the district court's decision today that temporarily continued the injunction against the regulation. We are reviewing the decision with the Justice Department and will examine all of our options, including appeal. The no-match regulation gives employers clear guidance on what to do if they receive a letter from the Social Security Administration communicating that an employee's name does not match the social security number it has on file. If an employer follows the regulation's guidance in good faith, which entails various steps to rectify the no-match within 90 days of receiving the letter, U.S. Immigration and Customs Enforcement will not use the letter as evidence in an enforcement action against the employer. If the company does nothing to resolve the problem it can be held liable for employing an unauthorized worker and could face stiff penalties or sanctions. Ultimately, employer diligence will make it more difficult for illegal aliens to use a fraudulent social security number to get a job."
United States. Department of Homeland Security
2007-10-10
-
Remarks by Homeland Security Secretary Michael Chertoff on the State of Immigration [November 6, 2007]
From the remarks of Michael Chertoff: "I'd like to cover four major areas today. First is what we're doing literally at the physical border itself, particularly the Southwest border. Second, I'd like to talk about what we're doing with respect to interior enforcement of the immigration laws, which of course tackles the economic magnet that pulls most illegal migrants into the United States. Third, I'd like to talk about what we're doing to deploy tools that employers can use to verify the legitimacy of their own workforce so that they can support the law instead of violating the law. And finally I'm going to talk a little bit about some measures we're putting into place to alleviate what will be an economic hardship as we crack down at illegal migrants by - in particular, I want to talk about measures we are going to put into effect to streamline the process of getting temporary workers with respect to agriculture."
United States. Department of Homeland Security
2007-11-06
-
Battle of Our Future: Remarks by Secretary Chertoff at Westminister College [October 17, 2007]
From the remarks of Secretary Chertoff: "So one of the charming things about history is that it's backward-looking. It's always easy to pick over what worked right and what worked not so right when you look backwards. And it always seems preordained. It always seems like the good guy wins, and that's been our history over the 20th century, the good guy won. That's the way all the war movies end. But you know, when you're in the war I don't think you know the good guy is going to win, and I don't think it's always clear the good guy is going to win, and I can't tell you that if we were complacent and turned our back on this problem, we wished it away, that good guy would win. I can certainly -- let me portray this -- I'm not trying to frighten you here, but I just laid out for you, if you imagine a circumstance in which bin Laden got a hold of a nuclear weapon and had the ability to deliver it to the United States, I want you to picture in your mind what the consequence would be if that would detonate in New York or Washington or Chicago or Los Angeles -- the enormous loss of life, the earth-shaking impact on the country's way of life and economy -- the no-doubt serious push at that point to compromise our civil liberties because, in the face of that there would be calls for doing things that are far beyond anything we've ever contemplated here. And ask yourself whether we shouldn't take some prudent measures to prevent that in advance, as opposed to downplaying the problem and then addressing what would be an unprecedented catastrophe if the event were to come about. And that is -- when you get to the point in your career that you are making life and death decisions and you have to recognize that guessing wrong causes a lot of deaths, I think you'll find it an interesting challenge to weigh those various factors."
United States. Department of Homeland Security
2007-10-17
-
Best Practices for Safe Mail Handling, Interagency Security Committee
"This Interagency Security Committee (ISC) document contains suggested information on government mail center operations that federal agencies can use to meet their needs. The document can assist security managers in establishing the best procedures for safe mail handling in their operations across the nation. Although suggestions provided are applicable for many situations involving security threats, they are intended only as guidance. This document represents a compilation of information already available from open sources such as the Center for Disease Control (CDC), General Services Administration (GSA), and Postal Service websites, other publications, and visits to federal mail centers (see Appendix A). The document also addresses dangerous mail handling and recommends preventive measures that agencies may implement to handle and deliver mail safely to their personnel. […] With the anthrax mailings of 2001, federal agencies have come to realize their mail centers may be the first point of attack by terrorists, either domestic or foreign. Federal agencies cannot assume these attacks will never be repeated; therefore, agencies must take the appropriate actions to mitigate risk. The government processes hundreds of billions of pieces of mail each year without incident; nevertheless, federal agencies must prepare for the worst case scenario. Threats can never be eliminated. For that reason, agencies should use risk to determine security measures. […] Safe mail handling covers a broad spectrum and various approaches can be taken to provide security. There is no 'one size fits all' solution for safe mail handling. Each operation must incorporate security measures that best mitigate the risk associated with each unique facility. Accordingly, the ISC will continue to explore innovative technologies that will effectively prevent, detect, and neutralize risks in mail centers."
United States. Department of Homeland Security
2007
-
Privacy Impact Assessment for the Chemical Security Assessment Tool (CSAT) [March 27, 2007]
"The Department of Homeland Security / Preparedness Directorate / Infrastructure Protection Division (DHS/PREP/IP) will deploy and maintain the Chemical Security Assessment Tool (CSAT). The CSAT is designed to be a web-based self-assessment tool for use by chemical facilities. The CSAT will collect and maintain information for a Point of Contact (POC) for each participating facility. This PIA covers the new CSAT system. Section 550 of Public Law 109-295 provided the Department of Homeland Security (DHS) the responsibility and authority to regulate high risk chemical facilities. Further, it requires the Secretary of the Department of Homeland Security (the Secretary) to identify high risk facilities and provide for the protection of the information regarding and provided by those facilities. Currently, the federal government does not possess the asset specific risk data to regulate high risk chemical facilities. CSAT has been identified by DHS/PREP/IP as the Information Technology (IT) system to obtain and quantify this key risk data from facilities covered under the Statute. It is the intent of the Secretary to begin the assessment of the chemical sector upon the issuance of the interim final regulations. Interim final regulations are required to be issued 6 months from the date of enactment, or April 4, 2007. In conjunction with the release of the interim final regulation that will be published in the Federal Register, Infrastructure Protection will inform the public and private sector of its goals and purpose via public announcements, participation in trade shows, and other means of public relations."
United States. Department of Homeland Security
2007-03-27
-
Interagency Security Committee: Responsibilities and Standard Operating Procedures
This guide outlines the responsibilities of members and the Standard Operating Procedures (SOP) to be followed by the Interagency Security Committee (ISC) and its working groups. This SOP replaces the one issued September 27, 2004.
United States. Department of Homeland Security
2007
-
Interagency Security Committee End of Year Report, 2006
This document highlights Interagency Security Committee (ISC) accomplishments for 2006. Accomplishments include: ISC planning conference and action plan; safe mail handling guidance; ISC standard operating procedures; HSPD-7 support, HSPD-12 support, National Infrastructure Protection Plan support; and the development of working groups dealing with security standards for existing buildings, physical security standards for child care facilities and land ports of entry, law enforcement access to federal facilities, and HSPD-12 migration strategy.
United States. Department of Homeland Security
2007
-
Fact Sheet: U.S. Department of Homeland Security Announces Eight Percent Increases in Fiscal Year 2008 Budget Request
"President Bush's fiscal year 2008 budget request for the Department of Homeland Security (DHS) represents $46.4 billion in funding, which is an increase of 8 percent over the FY 2007 level-excluding funds provided in emergency supplemental funding. The request targets five areas that are essential to preserving freedom and privacy, meeting future challenges, and fulfilling our mission of securing America."
United States. Department of Homeland Security
2007-02-05
-
6 CFR Part 27: Chemical Facility Anti-Terrorism Standards, Interim Final Rule
"The Department of Homeland Security (DHS or Department) issues this interim final rule (IFR) pursuant to Section 550 of the Homeland Security Appropriations Act of 2007 (Section 550), which provided the Department with authority to promulgate 'interim final regulations' for the security of certain chemical facilities in the United States. This rule establishes risk-based performance standards for the security of our Nation's chemical facilities. It requires covered chemical facilities to prepare Security Vulnerability Assessments (SVAs), which identify facility security vulnerabilities, and to develop and implement Site Security Plans (SSPs), which include measures that satisfy the identified risk-based performance standards. It also allows certain covered chemical facilities, in specified circumstances, to submit Alternate Security Programs (ASPs) in lieu of an SVA, SSP, or both. The rule contains associated provisions addressing inspections and audits, record keeping, and the protection of information that constitutes Chemical-terrorism Vulnerability Information (CVI). Finally, the rule provides the Department with authority to seek compliance through the issuance of Orders, including Orders Assessing Civil Penalty and Orders for the Cessation of Operations."
United States. Department of Homeland Security
2007-04-02
-
Fiscal Year 2008: State Preparedness Report Guidance
"The State Preparedness Report is one of the first steps in moving the grant processes, programs, and planning from a focus on loosely affiliated equipment, training, exercises and technical assistance projects to one that delivers an integrated picture of prevention, protection, response and recovery capacity. The Post Katrina Emergency Management Reform Act (PKEMRA) of 2006 (Section 652) established this reporting requirement. The intent of the requirement is to use the State Preparedness Report as a means to report on progress and showcase the capabilities and accomplishments of a State or Territory's all-hazards preparedness program. This report will enable States to communicate to Congress current accomplishments in building National Priorities and capabilities and how they will continue to increase statewide preparedness. In addition to this primary purpose, the State Preparedness Report also: (1) Plays a key role in reinforcing a common approach to preparedness, which was established in previous Federal guidance, including Homeland Security Presidential Directive 8, the National Incident Management System (NIMS) and the National Response Framework (NRF), the National Preparedness Guidelines (NPG), the National Planning Scenarios, and the Target Capabilities List (TCL) (2) Helps State program managers make informed decisions in their own preparedness planning by comparing historical information, current capability levels, future activities, and financial data in a single document (3) Facilitates communication with multiple audiences, including States, Congress, the Department of Homeland Security (DHS) and other Federal partners."2
United States. Department of Homeland Security
2007-11
-
Department of Homeland Security Office of the CIO: E-Government Act Report 2007
"The Department of Homeland Security (DHS) has identified the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) (2009), as required by the EGovernment Act of 2002 (Pub. L. No. 107-347), to support the requirements defined in the instructional memorandum. The US-VISIT initiative was selected based on the following criteria: a non-Presidential E-Government initiative or line of business. The Department of Homeland Security manages the US-VISIT project to facilitate legitimate travel and trade and ensure the integrity of our immigration system. The project automates many processes supporting immigration and border control programs at DHS. For instance, it enhances the security of our citizens and visitors while protecting the privacy of our visitors. […]. US-VISIT begins overseas, at the U.S. consular offices issuing visas, where visitors' biometric and biographic data (digital finger-scans and photographs) are collected and checked against a database of known criminals and suspected terrorists. Biometric data are measurements of physical characteristics--such as finger-scans, DNA, or retinal patterns--for use in verifying the identity of individuals. When the visitor arrives at the port of entry, their biometric and biographic data are captured. This information is then verified against the data captured during the time the visa was issued to ensure the person at our port is the same person who received the visa. US-VISIT effectively produces more accurate hit rates achieved through biometric referrals, resulting in a more efficient utilization of limited inspection resources."
United States. Department of Homeland Security
2007-09
-
Privacy Impact Assessment for the Department of Homeland Security General Contact Lists, June 15, 2007
"Many Department of Homeland Security operations and projects collect a minimal amount of contact information in order to distribute information and perform various other administrative tasks. Department Headquarters has conducted this privacy impact assessment because contact lists contain personally identifiable information. The Department's mission encompasses a wide variety of activities, including: emergency response, law enforcement and intelligence, critical infrastructure protection, immigration processing, and research and development of new technologies. In order to facilitate the accomplishment of these activities the Department is in constant contact with the public as well as partners in other federal, state, local, and international governmental organizations (hereinafter known as 'partners'). Part of the Department's interaction with the public and its partners involves the maintenance of very limited contact information. For example, a member of the public may request mail or email updates regarding emergency response procedures, or partners working on cross-agency project may need to be able to contact their peers. These types of situations require the exchange of minimal contact information in order to facilitate the Department's operations and service to the public."
United States. Department of Homeland Security
2007-06-15
-
Privacy Impact Assessment Update for the Chemical Security Assessment Tool (CSAT) [Updated May 25, 2007]
"This is an update to the previous Chemical Security Assessment Tool Privacy Impact Assessment. This is an update to the previous Chemical Security Assessment Tool Privacy Impact Assessment (PIA) in order to describe the additional web site functionality, the new eligibility requirements for CSAT users, and the deployment of the CSAT Help Desk. CSAT collects personally identifiable information from CSAT users and/or CVI web site users. Further, the CSAT Help Desk may collect contact information from both CSAT users requesting basic CSAT IT support or from the general public inquiring about the CSAT program. The Department of Homeland Security/National Protection & Programs Directorate (NPPD) (formerly Preparedness Directorate)/Chemical Security Assessment Tool (CSAT) is a suite of applications for use by applicable chemical sector entities as described in Section 550 of Public Law 109-295, which provides DHS the responsibility and authority to regulate high risk chemical facilities. This is an update to the previous Chemical Security Assessment Tool Privacy Impact Assessment (PIA) in order to describe the additional web site functionality, the new eligibility requirements for CSAT users, and the deployment of the CSAT Help Desk. The updates to CSAT include the following: the CVI Website; Chemical-Terrorism Vulnerability Information (CVI) Training; the Security Vulnerability Assessment (SVA); the Site Security Plan (SSP); new CSAT user roles -- Reviewer, and Authorizer; the CSAT security policy revision which allows individuals legally domiciled in the US to become CSAT users; and the CSAT Help Desk."
United States. Department of Homeland Security
2007-05-25
-
Hot Dogs, Pom-Poms & Terrorism? Football Stadium Security in Question: Student Research Exposes Many Vulnerabilities - Proposes Science & Technology Solutions
"During the 2006 college football season, attendance was more than 47 million with 3,392 games played between September and January. The University of Michigan had the highest per game attendance, packing 110,000 hot dog-munching and soda-guzzling fans shoulder-to-shoulder and cheek-to-cheek into the narrow seats of the 'Big House,' as it is called. For those at universities and colleges responsible for the safety of the attendees on game day, the final score can take on a lesser importance. In 2005, the Department of Homeland Security identified sports arenas as one of the most attractive potential terrorist targets for mass casualties and catastrophic economic impact. While the National Collegiate Athletic Association has a 'best practices' guide detailing security practices for public venues, there are no industry standards for university sport venue security. The result may be varying policies, procedures and levels of security among schools."
United States. Department of Homeland Security
2007-09
-
U.S. Department of Homeland Security Conducts Largest Counterterrorism Exercise to Date [September 24, 2007]
This press release discusses the U.S. Department of Homeland Security's comprehensive counterterrorism exercise, which took place October 15-19, 2007. Top Officials 4 (TOPOFF 4) was the fourth in a series of congressionally-mandated exercises and involved various federal agencies as well as the governments of Australia, Canada and the United Kingdom.
United States. Department of Homeland Security
2007-09-24
-
Federal Coordinator for Gulf Coast Rebuilding Hosts Forum for Leaders of Insurance Industry [September 19, 2007]
This press releases outlines a briefing to executives of the nation's leading property insurers on progress that has been made in the gulf coast region. "The purpose of today's meeting was to share information on improvements to hurricane protection systems and update the industry on the status of rebuilding in the Gulf Coast. A detailed briefing by the U.S. Army Corps of Engineers on the Interagency Performance Evaluation Task Force's (IPET) Risk and Reliability Report was provided, with a description of IPET's risk assessment model which characterizes current and future annual flood risk in the area. The web site, http://nolarisk.usace.army.mil, enables business and homeowners in the New Orleans area to make risk-informed decisions based on their business or home addresses."
United States. Department of Homeland Security
2007-09-19
-
Chronology of Changes to the Homeland Security Advisory System [Updated June 15, 2007]
This Web page contains a chronology of changes made to the Homeland Security Advisory System (HSAS) since its inception. The time-line begins on March 12, 2002 with the "introduction of the Homeland Security Advisory System at Yellow," and the latest update was on August 13, 2006 when the HSAS was "lowered from Red to Orange for flights originating in the United Kingdom bound for the United States. This is a "living" Web page that will be updated as the situation warrants."
United States. Department of Homeland Security
2007-06-15
-
Remarks by Homeland Security Secretary Michael Chertoff at a Symposium on Improvised Explosive Devices in the United States [October 19, 2007]
From the remarks of Secretary Chertoff: "You know, in some ways, the discussion of IED threats is the discussion of terrorism because although we can conceive of a terrorist attack that would be focused on a biological infection or some kind of a chemical spray, the reality is the vast majority of terrorist attacks are conducted with bombs. And of those, the vast majority are improvised explosive devices. They're not pre-existing manufactured bombs that would be used by a military force. And so it's not surprising that the challenge of dealing with IEDs is one that is a global challenge, whether it is in the war zone in Iraq or Afghanistan, or in Europe where the Germans recently rolled up a plot to use peroxide-based IEDs to cause damage in Germany, or in Britain where we've seen an aborted effort earlier this summer to use vehicle-borne IEDs to cause damage in London, or whether it's the concern we have in this country about IEDs. And of course we all remember the bombing of Oklahoma City, which was in fact an IED. So the very essence of what we do in fighting terrorism in a way is a challenge to the issue of IEDs."
United States. Department of Homeland Security
2007-10-19
-
Remarks by Assistant Secretary for Infrastructure Protection Robert B. Stephan at a Pen and Pad Media Briefing on the Release of Appendix A of the Chemical Facility Anti-Terrorism Standards [November 5, 2007]
This transcript includes the November 5, 2007 remarks of Robert B. Stephen at a Pen and Pad Media Briefing on the Release of Appendix A of the Chemical Facility Anti-Terrorism Standards. The question/answer session with the media is also included. Robert B. Stephen: "Appendix A is important, because Appendix A defines the universe of things that will enter the first step in our regulatory process. It's very important that everyone understands that that the regulatory universe or the regulated universe, those chemical facilities or those users of chemicals of concern that are on this list now were not identified in the authorizing legislation."
United States. Department of Homeland Security
2007-11-05
-
Remarks by Homeland Security Secretary Michael Chertoff at the 2007 B'Nai Brith International Policy Conference [October 30, 2007]
From the remarks of Secretary Chertoff: "So, the first step to a reality-based idealism in this 21st century is to clearly identify the threat we face today in an honest and straightforward manner, and that is this threat of violent extremism that I've described. And the second step is to have a vision of a strategy that aims not only to manage the problem but to transform the problem. How do we do that? How do we transform the problem? Well, we begin by exhibiting continuing strength and resolve. Almost immediately after September 11th, we destroyed al Qaeda's headquarters in Afghanistan, we deployed our intelligence assets across the globe, we captured and killed terrorists on nearly every continent, we partnered with our allies on information sharing and intelligence, and we adapted in numerous ways to the evolving threats that had emerged, both overseas and at home. And of course, part of that adaptation here at home was the establishment of my own department, the Department of Homeland Security. But to go beyond merely that stalemate position, to truly transform the battlefield and landscape, we have to fight a battle of hearts and minds, recognizing that the way out of an endless struggle with an ideology of hate is the pursuit and promotion of freedom."
United States. Department of Homeland Security
2007-10-30
-
Remarks by Homeland Security Secretary Michael Chertoff at the Eighth Annual U.S. Customs and Border Protection 2007 Trade Symposium [November 15, 2007]
From the remarks of Michael Chertoff: "I'm going to talk a little bit about partnership and a couple of principles as they apply directly to the issue of our trading system. And of course the other two principles are: layering and risk management. In a nutshell, this explains the operational approach and the strategy which we take to doing exactly what I suggest that we need to do: protecting ourselves against people who want to exploit trade and travel to do us harm."
United States. Department of Homeland Security
2007-11-15